General

  • Target

    2024-05-25_a2ddb06e5bbbf3a9645ba99605eb7808_virlock

  • Size

    2.5MB

  • Sample

    240525-w4sjlsde5w

  • MD5

    a2ddb06e5bbbf3a9645ba99605eb7808

  • SHA1

    d83951ea66af6d028816f42fbf325eab50692ffb

  • SHA256

    e304cb40343e669ec3535ee68203b3337e65afc203eef36538a8b9c5a33e95e7

  • SHA512

    2c28a39ade83b98a75edaac199b4927d0ee3bfa5d8ad04b00a693c23603c9a2df6ab6369cddd3f28f0ca65a0842fc0751c538c7359ca752a002ae9a6ed8aabb3

  • SSDEEP

    24576:SRWrlwUWxaxM42Mi1XsjrxHdT4rxDMqdFLUHwA619SyBUzxhdUYiN4FBmDqG2RXX:hlwbwjS8SDXdBq0SyBNYBbuOAJe4Kl

Malware Config

Targets

    • Target

      2024-05-25_a2ddb06e5bbbf3a9645ba99605eb7808_virlock

    • Size

      2.5MB

    • MD5

      a2ddb06e5bbbf3a9645ba99605eb7808

    • SHA1

      d83951ea66af6d028816f42fbf325eab50692ffb

    • SHA256

      e304cb40343e669ec3535ee68203b3337e65afc203eef36538a8b9c5a33e95e7

    • SHA512

      2c28a39ade83b98a75edaac199b4927d0ee3bfa5d8ad04b00a693c23603c9a2df6ab6369cddd3f28f0ca65a0842fc0751c538c7359ca752a002ae9a6ed8aabb3

    • SSDEEP

      24576:SRWrlwUWxaxM42Mi1XsjrxHdT4rxDMqdFLUHwA619SyBUzxhdUYiN4FBmDqG2RXX:hlwbwjS8SDXdBq0SyBNYBbuOAJe4Kl

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (57) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks